Tag эппл

2 bookmarks have this tag.

2024-01-16

13.

Jeffrey Paul: Your Computer Isn't Yours (ru)

sneak.berlin/i18n/2020-11-12-your-computer-isnt-yours.ru

2023-12-28

7.

Operation Triangulation: The last (hardware) mystery

securelist.com/operation-triangulation-the-last-hardware-mystery/111669

This attachment exploits the remote code execution vulnerability CVE-2023-41990 in the undocumented, Apple-only ADJUST TrueType font instruction.

to bypass this hardware-based security protection, the attackers used another hardware feature of Apple-designed SoCs.

....
Our guess is that this unknown hardware feature was most likely intended to be used for debugging or testing purposes by Apple engineers or the factory, or that it was included by mistake. Because this feature is not used by the firmware, we have no idea how attackers would know how to use it.

You may notice that this hash does not look very secure, as it occupies just 20 bits (10+10, as it is calculated twice), but it does its job as long as no one knows how to calculate and use it.